46 research outputs found

    Barcode Technology and its Application in Libraries

    Get PDF
    Abstract The library is one of the essential place in any academic institution. With the invention of ICT (Information and Communications Technology), every sector now a day are trying to automate their system and library is also one of them. We can find that the technologies have taken over and helped the library in various ways. Now a day’s libraries need new tools that will allow them to increase their productivity and improve user service without adding personnel. Application of Barcode technology in libraries is a way to process client requests from fast to fastest. Barcode technology is mostly used in the circulation system of a library and most successful due to its speed, accuracy and reliability. Barcoding though comparatively an old technology is one of the significant steps in library automation and is still not widely used in libraries. This article briefly discusses the description of the application of Barcode technology in libraries, its working mechanism and also the advantages and disadvantages of this technology. The researcher has tried to explore the technical aspects of Barcode technology in the library. The main aim of the article is to create awareness among the librarians to use Barcode technology in the library. Barcode is very cost-effective technology can be used by every library. The paper also discusses the creation of Barcode with Glabels open-source software which is absolutely free of cost

    Customization of Koha Online Public Access Catalogue: An Experimental Study

    Get PDF
    Purpose: An online public access catalogue (OPAC) is an online database of all the resources and materials available in a particular library. OPAC could potentially replace the old fashioned card catalogue as a means of helping library users to find the resources which they want. The purpose of the study is to explore various aspects of the customization of Koha OPAC. Methodology: An experimental research method has been adopted for the study to customize the OPAC. HTML, Java and CSS coding has been used as a command to customize the front view of the OPAC. Findings: Koha OPAC is distributed into six parts namely Header, Left (Upper & Bottom) Navigation, Main User Block (The centre area of the OPAC where content will be written), Right Navigation and Footer. The technology is highly interactive for editing provision to a library professional with less experience in advanced programming skills. Originality: The customization process enables the fellow professional to get acquainted with new features to utilize the potential of Koha, and at the same time it helps the users to find the useful open access e-resource links in one platform, they can easily search through a single click which will save the time of the users as well as they need not remember the URL for these e-resource platforms or databases

    COLLECTION DEVELOPMENT POLICY FOR E-RESOURCES

    Get PDF
    Collection development is a most important process of a library. This process increases the reading materials of the library for the satisfaction of the reader approach. Collection development policy acts as a guide for selecting library materials. It helps to maintain library cooperation and communication between library staff. This process increases the reading materials of the library for the satisfaction of the reader approach. Collection development policies are written statements of goals and evaluative parameters to guide decision-making when adding material to a library collection. A large number of e-resources collection has become a challenge to libraries as a lot of information is now available to the public without having to visit and use the traditional library. American Library Association states that the collection development policies document which defines the scope of a library’s existing collections, plan for the continuing development of resources, identify collection strength and outline the relationship between selection philosophy and institutions goals, general selection criteria, and intellectual freedom. In electronic environment collection development policy select tools and processes, set the principles for the management of electronic resources, allocating the budget for buying of e-resources. Due to information technology, most of the libraries are involved in the sharing of the e-resources in many ways. The Collection development policy must indeed be clear whether the collection is in print or electronic form and also it should full fill the user\u27s demand. This article tried to explore the different collection development policies for e-resources. The information provided in this article is based on secondary data. The information available in this article is a general kind of information and it is applicable in all kinds of libraries

    The Implementation of Koha Web-OPAC

    Get PDF
    This is written by Bareh and Chand

    RFID Technology in Academic Libraries of North-East India

    Get PDF
    Men has made significant efforts to achieve or to know the unknown from the initialization of civilization. The importance of the library is growing since the use of ICT and modern technologies. Library management software helps libraries to maintain library housekeeping operation easily. In a library kind of environment, RFID has significant potential to speed up library services and streamline time-consuming operations such as check-in and check-out, sorting, stock management and inventory when compared to the barcode-based solution. RFID provides for “sightless” or no line of sight identification of items. It includes the ability to facilitate circulation, re-shelving, and theft detection, and it has several other important advantages. RFID is still a relatively new technology. So far, several libraries in North-East India have implemented RFID system, mostly for self-service and the vast majority of these libraries are positive about their RFID investment and its benefits. This paper deals with the adoption policy of RFID technology in the library and its significant use in the library for better inventory control, theft detection, quick issue-return etc. The researcher has collected data from various RFID implemented libraries to know the facilities availed and problem faced by the libraries. Lastly then researcher has tried to put some suggestion for those libraries who has not implemented RFID technology in their libraries, the researcher also mentioned some guidelines regarding RFID implementation

    Lazy Asynchronous I/O for Event-Driven Servers

    Get PDF
    In this paper , we introduce Lazy Asynchronous I/O (LAIO),a new API for performing I/O that is well-suited but not limited to the needs of high-performance, event-driven servers. In addition, we describe and evaluate an implementation of LAIO that demonstrably addresses certain critical limitations of the asynchronous and non-blocking I/O support in present Unix-like systems. LAIO is implemented entirely at user-level, without modification to the operating system’s kernel. It utilizes scheduler activations. Using a micro-benchmark, LAIO was shown to be more than 3 times faster than AIO when the data base was already available in memory. It also had a comparable performance to AIO when actual I/O needed to be made. An event driven web server (thttpd) archived more than 38% increase in its throughput using LAIO. The Flash web server’s throughput, originally archived with kernel modification, was matched using LAIO without making kernel modification

    Causeway: Support for Controlling and Analyzing the Execution of Web-Accessible Applications

    Get PDF
    Causeway provides runtime support for the development of distributed meta-applications. These meta-applications control or analyze the behavior of multi-tier distributed applications such as multi-tier web sites or web services. Examples of meta-applications include multi-tier debugging, fault diagnosis, resource tracking, prioritization, and security enforcement. Efficient online implementation of these meta-applications requires meta-data to be passed between the different program components. Examples of metadata corresponding to the above meta-applications are request identifiers, priorities or security principal identifiers. Causeway provides the infrastructure for injecting, destroying, reading, and writing such metadata. The key functionality in Causeway is forwarding the metadata associated with a request at so-called transfer points, where the execution of that request gets passed from one component to another. This is done automatically for system-visible channels, such as pipes or sockets. An API is provided to implement the forwarding of metadata at system-opaque channels such as shared memory. We describe the design and implementation of Causeway, and we evaluate its usability and performance. Causeway’s low overhead allows it to be present permanently in production systems. We demonstrate its usability by showing how to implement, in 150 lines of code and without modification to the application, global priority enforcement in a multi-tier dynamic web server

    Cu(II) and Gd(III) doped boehmite nanostructures: a comparative study of electrical property and thermal stability

    Get PDF
    The present article reports the effect of transition (Cu2+) and rare earth metal (Gd3+) ion doping on structural, microstructural and electrical properties of boehmite nanoparticles. Rietveld refinement is adopted here to refine the x-ray diffractograms for further analyzing the microstructural details and their alteration due to the incorporation of foreign cations. This is probably the first time when dielectric properties of these doped boehmite samples having been reported herein. These samples show remarkably high dielectric constant values which corroborate that doping enhances the microstrain values inside the orthorhombic structure and results in higher crystallographic defects. Enhancement in defect sites causes the augmentation of relative permittivity and ac conductivity. Temperature stability has also been enhanced significantly in our Cu-doped sample. The present study enables us to determine a relationship between crystalline deformation and electrical properties of nanomaterials which may be highly beneficial in fabricating cost-effective energy harvesting devices

    Scrub: Online TroubleShooting for Large Mission-Critical Applications

    Get PDF
    Scrub is a troubleshooting tool for distributed applications that operate under strict SLOs common in production environments. It allows users to formulate queries on events occurring during execution in order to assess the correctness of the application’s operation. Scrub has been in use for two years at Turn, where developers and users have relied on it to resolve numerous issues in its online advertisement bidding platform. This platform spans thousands of machines across the globe, serving several million bid requests per second, and dispensing many millions of dollars in advertising budgets. Troubleshooting distributed applications is notoriously hard, and its difficulty is exacerbated by the presence of strict SLOs, which requires the troubleshooting tool to have only minimal impact on the hosts running the application. Furthermore, with large amounts of money at stake, users expect to be able to run frequent diagnostics and demand quick evaluation and remediation of any problems. These constraints have led to a number of design and implementation decisions, that go counter to conventional wisdom. In particular, Scrub supports only a restricted form of joins. Its query execution strategy eschews imposing any overhead on the application hosts. In particular, joins, group-by operations and aggregations are sent to a dedicated centralized facility. In terms of implementation, Scrub avoids the overhead and security concerns of dynamic instrumentation. Finally, at all levels of the system, accuracy is traded for minimal impact on the hosts. We present the design and implementation of Scrub and contrast its choices to those made in earlier systems. We illustrate its power by describing a number of use cases, and we demonstrate its negligible overhead on the underlying application. On average, we observe a maximum CPU overhead of up to 2.5% on application hosts and a 1% increase in request latency. These overheads allow the advertisement bidding platform to operate well within its SLOs
    corecore